标题:
一些6.0EXE的修改地址..........
[打印本页]
作者:
a117398902
时间:
2015-6-1 00:16
标题:
一些6.0EXE的修改地址..........
本人修改6.0的私人笔记,共享且备份..................基本都是策略有关的地址,有些找了N久也找不到(不懂汇编是这样的啦
.......)欢迎志同道者补充修正
*****
兵种专有的辅助装备修改
*****:
6.0地址是——00406CC8 | BA 10524000 MOV EDX,Ekd5.00405210 ;00405210是数据地址,可根据需要随便选择一处空位置
*****************
人物致命一击台词指定
***************************************
UE地址89C30(21组)
例:01000000 即第2句指向第2个武将
--------------------------------------------------------------------------
***********************
策略类型
**************
UE地址24e53开始
---------------------------------------------------------
********************
策略威力
*************
UE地址3B71E开始
-------------------------------------------------------
********************
策略动画
*************
UE地址858BE
-------------------------------------
********************
策略施展条件(天气、装备....)
*************
UE地址1F47C
-------------------------------------------
********************
策略地形限制
*************
UE地址1FD3C 1FEA2 注意1FD3C全地形释放值为11 1FEA2全地形释放值为04
两项值都要改
--------------------------------------------------
*********************
青龙策略攻击次数
****************
OB地址:00424FA9 |. 83F9 05 |CMP ECX,5 (5后面数值有改动就要一起改,且要大于后者)
00425026 |. 83F8 05 |CMP EAX,5 (5就是真正的攻击次数,该数值要大于前者的数值——数值16进制)
--------------------------------------------------------------------------------
************************
武器、防具经验获得
************
UE地址:2d29(命中后武器获得经验数值) 2d48(未命中武器获得经验数值)
2F03(被命中后防具获得经验值) 2F17(格挡后防具获得经验值)
-------------------------------------------------------------------------------------------------------------
[
本帖最后由 a117398902 于 2015-7-3 12:47 编辑
]
作者:
YSH0212
时间:
2015-6-2 22:02
首先为楼主的精神赞一个。
我也是新手,其实我觉得现在我们修改引擎遇到最大的问题就是资料太少,
每次遇到问题都得自己去研究,成本太高,而且有些东西还是很难完全理解的。
我也积累了一些6.0的汇编资料,过一段时间也想整理了发出来。
希望大家能减少些弯路。
作者:
a117398902
时间:
2015-6-2 22:56
标题:
回复 #2 YSH0212 的帖子
正在逐步将一些star175君未说明的地址(只限我知道的)制作成CM(对CM初认识,制作进度缓慢),方便修改,日后阁下整理的资料出来了,希望能同意一起加进去集成
图片附件:
1.jpg
(2015-6-2 22:56, 109.72 K) / 该附件被下载次数 72
http://xycq.org.cn/forum/attachment.php?aid=139096
作者:
古月新风
时间:
2015-6-5 17:05
楼主厉害。。。我也来发点,6.0的不怎么知道,5.9的:
反弹异常攻击
00472C45 /$ 55 push ebp
00472C46 |. 8BEC mov ebp,esp
00472C48 |. 52 push edx
00472C49 |. 8A4A 01 mov cl,byte ptr ds:[edx+0x1]
00472C4C |. E8 A835F9FF call Ekd5.004061F9
00472C51 |. E8 3939F9FF call Ekd5.0040658F
00472C56 |. 6A 01 push 0x1
00472C58 |. 6A 01 push 0x1
00472C5A |. 6A 59 push 0x59 人物+装备
00472C5C |. 6A 12 push 0x12
00472C5E |. E8 35C70500 call Ekd5.004CF398 装备测试
00472C63 |. 85C0 test eax,eax
00472C65 |. 74 0C je XEkd5.00472C73
00472C67 |. 8B45 FC mov eax,[local.1]
00472C6A |. 8A08 mov cl,byte ptr ds:[eax]
00472C6C |. E8 8835F9FF call Ekd5.004061F9
00472C71 |. B0 01 mov al,0x1
00472C73 |> 8BE5 mov esp,ebp
00472C75 |. 5D pop ebp
00472C76 \. C3 retn
攻击响应函数
004CF3D5 55 push ebp
004CF3D6 8BEC mov ebp,esp
004CF3D8 83EC 14 sub esp,0x14
004CF3DB 8945 FC mov dword ptr ss:[ebp-0x4],eax
004CF3DE FF30 push dword ptr ds:[eax]
004CF3E0 E8 FF6DF3FF call Ekd5.004061E4 这个函数把data序号乘以48,得武将data值对应的ecx值。
004CF3E5 6A 01 push 0x1
004CF3E7 6A 01 push 0x1
004CF3E9 6A 36 push 0x36 引导攻击
004CF3EB 6A 18 push 0x18
004CF3ED E8 A6FFFFFF call Ekd5.004CF398 装备、效果值测试
004CF3F2 84C0 test al,al
004CF3F4 74 67 je XEkd5.004CF45D
004CF3F6 E8 2067F5FF call Ekd5.00425B1B
004CF3FB FF75 FC push dword ptr ss:[ebp-0x4]
004CF3FE E8 9470F6FF call Ekd5.00436497
004CF403 8945 F4 mov dword ptr ss:[ebp-0xC],eax
004CF406 C645 EC 00 mov byte ptr ss:[ebp-0x14],0x0
004CF40A 8B45 F4 mov eax,dword ptr ss:[ebp-0xC]
004CF40D 8A00 mov al,byte ptr ds:[eax]
004CF40F 3C FF cmp al,0xFF
004CF411 74 44 je XEkd5.004CF457
004CF413 8945 F0 mov dword ptr ss:[ebp-0x10],eax
004CF416 50 push eax
004CF417 8B4D FC mov ecx,dword ptr ss:[ebp-0x4]
004CF41A FF71 04 push dword ptr ds:[ecx+0x4]
004CF41D E8 0764F6FF call Ekd5.00435829
004CF422 83C4 08 add esp,0x8
004CF425 FF75 F0 push dword ptr ss:[ebp-0x10]
004CF428 8B4D FC mov ecx,dword ptr ss:[ebp-0x4]
004CF42B FF71 04 push dword ptr ds:[ecx+0x4]
004CF42E B9 F0274900 mov ecx,Ekd5.004927F0
004CF433 E8 B970F3FF call Ekd5.004064F1
004CF438 8B4D F0 mov ecx,dword ptr ss:[ebp-0x10]
004CF43B FE45 EC inc byte ptr ss:[ebp-0x14]
004CF43E 807D EC FF cmp byte ptr ss:[ebp-0x14],0xFF
004CF442 73 13 jnb XEkd5.004CF457
004CF444 E8 B06DF3FF call Ekd5.004061F9
004CF449 E8 380E0000 call Ekd5.004D0286
004CF44E 85C0 test eax,eax
004CF450 75 05 jnz XEkd5.004CF457
004CF452 FF45 F4 inc dword ptr ss:[ebp-0xC]
004CF455 ^ EB B3 jmp XEkd5.004CF40A
004CF457 8B4D F0 mov ecx,dword ptr ss:[ebp-0x10]
004CF45A 8A45 EC mov al,byte ptr ss:[ebp-0x14]
004CF45D 8BE5 mov esp,ebp
004CF45F 5D pop ebp
004CF460 C3 retn
攻击函数
004064F1 /$ 55 PUSH EBP
004064F2 |. 8BEC MOV EBP,ESP
004064F4 |. 51 PUSH ECX
004064F5 |. FF75 0C PUSH DWORD PTR SS:[EBP+C]
004064F8 |. FF75 08 PUSH DWORD PTR SS:[EBP+8]
004064FB |. 803D 9A0E5000>CMP BYTE PTR DS:[500E9A],0
00406502 |. 74 05 JE SHORT Ekd5.00406509
00406504 |. E8 20F30200 CALL Ekd5.00435829
00406509 |> 8B4D FC MOV ECX,DWORD PTR SS:[EBP-4] ; |
0040650C |. E8 1EFDFFFF CALL Ekd5.0040622F ; \Ekd5.0040622F
00406511 |. 8B55 FC MOV EDX,DWORD PTR SS:[EBP-4]
00406514 |. C682 08060000>MOV BYTE PTR DS:[EDX+608],0 计数器等于0
0040651B |. EB 1C JMP SHORT Ekd5.00406539
0040651D |> 8B45 FC /MOV EAX,DWORD PTR SS:[EBP-4]
00406520 |. FE80 08060000 |INC BYTE PTR DS:[EAX+608]
00406526 |. 8B4D 08 |MOV ECX,DWORD PTR SS:[EBP+8]
00406529 |. E8 CBFCFFFF |CALL Ekd5.004061F9
0040652E |. 6A 08 |PUSH 8 ; /Arg1 = 00000008
00406530 |. E8 AB010000 |CALL Ekd5.004066E0 ; \Ekd5.004066E0
00406535 |. 85C0 |TEST EAX,EAX
00406537 |. 75 2D |JNZ SHORT Ekd5.00406566
00406539 |> 8B4D FC MOV ECX,DWORD PTR SS:[EBP-4]
0040653C |. 80B9 08060000>|CMP BYTE PTR DS:[ECX+608],2
00406543 |. 73 21 |JNB SHORT Ekd5.00406566
00406545 |. E8 97F8FFFF |CALL Ekd5.00405DE1 攻击伤害
0040654A |. 8B4D FC |MOV ECX,DWORD PTR SS:[EBP-4]
0040654D |. E8 6FC00400 |CALL Ekd5.004525C1 攻击动作显示
00406552 |. 8B4D FC |MOV ECX,DWORD PTR SS:[EBP-4]
00406555 |. E8 0CF4FFFF |CALL Ekd5.00405966 攻击后附加属性处理
0040655A |. 8B4D FC |MOV ECX,DWORD PTR SS:[EBP-4]
0040655D |. E8 61FBFFFF |CALL Ekd5.004060C3 判断是否连击。
00406562 |. 85C0 |TEST EAX,EAX
00406564 |.^ 75 B7 \JNZ SHORT Ekd5.0040651D 有连击就再执行一次。
00406566 |> 8B4D FC MOV ECX,DWORD PTR SS:[EBP-4]
00406569 |. E8 CE050000 CALL Ekd5.00406B3C
0040656E |. 6A 00 PUSH 0
00406570 |. 8B4D FC MOV ECX,DWORD PTR SS:[EBP-4]
00406573 |. E8 BA450200 CALL Ekd5.0042AB32 经验值处理,升级显示
00406578 |. 803D 9A0E5000>CMP BYTE PTR DS:[500E9A],0
0040657F |. 75 08 JNZ SHORT Ekd5.00406589
00406581 |. 8B4D FC MOV ECX,DWORD PTR SS:[EBP-4]
00406584 |. E8 60FEFFFF CALL Ekd5.004063E9 反击处理
00406589 |> 8BE5 MOV ESP,EBP
0040658B |. 5D POP EBP
0040658C \. C2 0800 RETN 8
都是一年前弄的了,发出来,望与楼主共勉。顺便求楼主私聊
作者:
古月新风
时间:
2015-6-5 17:09
自己写的自己都忘记了,当时也只是想拿来改改的,所以单纯复制,比较简单,供参考。反正6.0根5.9大部分特效代码位置差不多
伤害函数
[EBP-4]这个变量是做计数器的
[EBP-8]是放被攻击武将的Ecx值
传进来的就是Ecx放的内存地址量了.本函数里用局部变量[EBP-C]存放004927F0 这个全局地址
这个地方有个很重要处,就是004927F0+i*4+84等于攻击伤害值 (i的值在就是[EBP-4])
[EBP-10] 和MP值相关
[EBP-14] 和HP 值相关
[EBP-18]物理攻击经验值
[EBP-1C]武器经验值
00405DE1 /$ 55 PUSH EBP
00405DE2 |. 8BEC MOV EBP,ESP
00405DE4 |. 83EC 2C SUB ESP,2C
00405DE7 |. 894D F4 MOV DWORD PTR SS:[EBP-C],ECX
00405DEA |. 6A 00 PUSH 0 ; /Arg3 = 00000000
00405DEC |. 6A 74 PUSH 74 ; |Arg2 = 00000074
00405DEE |. 8B45 F4 MOV EAX,DWORD PTR SS:[EBP-C] ; | [EBP-C]存放全局地址, 004927F0+i*4+84等于攻击伤害值 (i的值在就是[EBP-4])
00405DF1 |. 05 84000000 ADD EAX,84 ; |
00405DF6 |. 50 PUSH EAX ; |Arg1
00405DF7 |. E8 179F0700 CALL Ekd5.0047FD13 ; \Ekd5.0047FD13
00405DFC |. 83C4 0C ADD ESP,0C
00405DFF |. 6A 00 PUSH 0 ; /Arg3 = 00000000
00405E01 |. 6A 74 PUSH 74 ; |Arg2 = 00000074
00405E03 |. 8B4D F4 MOV ECX,DWORD PTR SS:[EBP-C] ; |
00405E06 |. 81C1 54020000 ADD ECX,254 ; |
00405E0C |. 51 PUSH ECX ; |Arg1
00405E0D |. E8 019F0700 CALL Ekd5.0047FD13 ; \Ekd5.0047FD13 此被调用函数和原版无区别。
00405E12 |. 83C4 0C ADD ESP,0C
00405E15 |. 33D2 XOR EDX,EDX
00405E17 |. 8955 FC MOV DWORD PTR SS:[EBP-4],EDX
00405E1A |. EB 03 JMP SHORT Ekd5.00405E1F
00405E1C |> FE45 FC /INC BYTE PTR SS:[EBP-4]
00405E1F |> 8B45 FC MOV EAX,DWORD PTR SS:[EBP-4]
00405E22 |. 8B4D F4 |MOV ECX,DWORD PTR SS:[EBP-C]
00405E25 |. 8A5408 10 |MOV DL,BYTE PTR DS:[EAX+ECX+10]
00405E29 |. 80FA FF |CMP DL,0FF
00405E2C |. 0F84 82020000 |JE Ekd5.004060B4 //退出
00405E32 |. 8851 01 |MOV BYTE PTR DS:[ECX+1],DL
00405E35 |. 8ACA |MOV CL,DL
00405E37 |. E8 BD030000 |CALL Ekd5.004061F9
00405E3C |. 894D E0 |MOV DWORD PTR SS:[EBP-20],ECX
00405E3F |. 8B4D E0 |MOV ECX,DWORD PTR SS:[EBP-20]
00405E42 |. E8 48070000 |CALL Ekd5.0040658F
00405E47 |. 894D F8 |MOV DWORD PTR SS:[EBP-8],ECX
00405E4A |. 33C0 |XOR EAX,EAX
00405E4C |. 3B05 042E4900 |CMP EAX,DWORD PTR DS:[492E04]
00405E52 |. 1BC9 |SBB ECX,ECX
00405E54 |. F7D9 |NEG ECX
00405E56 |. 8B45 F4 |MOV EAX,DWORD PTR SS:[EBP-C]
00405E59 |. 8A90 08060000 |MOV DL,BYTE PTR DS:[EAX+608]
00405E5F |. 84D2 |TEST DL,DL
00405E61 |. 75 03 |JNZ SHORT Ekd5.00405E66
00405E63 |. 51 |PUSH ECX
00405E64 |. EB 02 |JMP SHORT Ekd5.00405E68
00405E66 |> 6A 02 |PUSH 2
00405E68 |> 6A 01 |PUSH 1 ; |Arg2 = 00000001
00405E6A |. FF75 E0 |PUSH DWORD PTR SS:[EBP-20] ; |Arg1
00405E6D |. 8B45 F4 |MOV EAX,DWORD PTR SS:[EBP-C] ; |
00405E70 |. 8B48 0C |MOV ECX,DWORD PTR DS:[EAX+C] ; |
00405E73 |. E8 EA5D0300 |CALL Ekd5.0043BC62 ; \Ekd5.0043BC62 攻击伤害计算。
00405E78 |. 803D F45F5000>|CMP BYTE PTR DS:[505FF4],0
00405E7F |. 74 0C |JE SHORT Ekd5.00405E8D
00405E81 |. 8B55 FC |MOV EDX,DWORD PTR SS:[EBP-4]
00405E84 |. 84D2 |TEST DL,DL
00405E86 |. 74 05 |JE SHORT Ekd5.00405E8D
00405E88 |. E8 05810100 |CALL Ekd5.0041DF92
00405E8D |> 8B4D FC |MOV ECX,DWORD PTR SS:[EBP-4] [EBP-4]计数器
00405E90 |. 8B55 F4 |MOV EDX,DWORD PTR SS:[EBP-C] [EBP-C]浮动地址
00405E93 |. 8D948A 840000>|LEA EDX,DWORD PTR DS:[EDX+ECX*4+84]
00405E9A |. 8955 D8 |MOV DWORD PTR SS:[EBP-28],EDX
00405E9D |. 8902 |MOV DWORD PTR DS:[EDX],EAX
00405E9F |. 85C9 |TEST ECX,ECX
00405EA1 |. 0F85 7D000000 |JNZ Ekd5.00405F24
00405EA7 |. 8B4D F4 |MOV ECX,DWORD PTR SS:[EBP-C]
00405EAA |. 8A49 01 |MOV CL,BYTE PTR DS:[ECX+1]
00405EAD |. E8 47030000 |CALL Ekd5.004061F9 自定义函数:栈值转化成ecx值。
00405EB2 |. E8 CFA30C00 |CALL Ekd5.004D0286 返回武将当前体力
00405EB7 |. 85C0 |TEST EAX,EAX
00405EB9 |. 76 69 |JBE SHORT Ekd5.00405F24 不是0就就表示攻击武将被打死。
00405EBB |. 0FB605 9B0E50>|MOVZX EAX,BYTE PTR DS:[500E9B]
00405EC2 |. 85C0 |TEST EAX,EAX
00405EC4 |. 74 07 |JE SHORT Ekd5.00405ECD
00405EC6 |. B0 64 |MOV AL,64
00405EC8 |. 8945 DC |MOV DWORD PTR SS:[EBP-24],EAX
00405ECB |. EB 35 |JMP SHORT Ekd5.00405F02
00405ECD |> 8B4D F4 |MOV ECX,DWORD PTR SS:[EBP-C]
00405ED0 |. E8 86FEFFFF |CALL Ekd5.00405D5B
00405ED5 |. 8945 DC |MOV DWORD PTR SS:[EBP-24],EAX
00405ED8 |. 83F8 64 |CMP EAX,64
00405EDB |. 77 10 |JA SHORT Ekd5.00405EED
00405EDD |. 6A 00 |PUSH 0 ; /Arg2 = 00000000
00405EDF |. 50 |PUSH EAX ; |Arg1
00405EE0 |. E8 B1190300 |CALL Ekd5.00437896 ; \Ekd5.00437896
00405EE5 |. 85C0 |TEST EAX,EAX
00405EE7 |. 74 3B |JE SHORT Ekd5.00405F24
00405EE9 |. 8345 DC 64 |ADD DWORD PTR SS:[EBP-24],64
00405EED |> 8B4D F8 |MOV ECX,DWORD PTR SS:[EBP-8]
00405EF0 |. E8 DAFEFFFF |CALL Ekd5.00405DCF
00405EF5 |. 85C0 |TEST EAX,EAX
00405EF7 |. 74 09 |JE SHORT Ekd5.00405F02
00405EF9 |. 8B55 D8 |MOV EDX,DWORD PTR SS:[EBP-28]
00405EFC |. 33C0 |XOR EAX,EAX
00405EFE |. 8902 |MOV DWORD PTR DS:[EDX],EAX
00405F00 |. EB 15 |JMP SHORT Ekd5.00405F17
00405F02 |> 8B55 D8 |MOV EDX,DWORD PTR SS:[EBP-28]
00405F05 |. FF32 |PUSH DWORD PTR DS:[EDX]
00405F07 |. 8B45 DC |MOV EAX,DWORD PTR SS:[EBP-24]
00405F0A |. D1F8 |SAR EAX,1
00405F0C |. 50 |PUSH EAX
00405F0D |. E8 82970C00 |CALL Ekd5.004CF694
00405F12 |. 8B55 D8 |MOV EDX,DWORD PTR SS:[EBP-28]
00405F15 |. 0102 |ADD DWORD PTR DS:[EDX],EAX
00405F17 |> 8B45 F4 |MOV EAX,DWORD PTR SS:[EBP-C]
00405F1A |. C780 04060000>|MOV DWORD PTR DS:[EAX+604],1
00405F24 |> 8B4D F4 |MOV ECX,DWORD PTR SS:[EBP-C]
00405F27 |. 80B9 08060000>|CMP BYTE PTR DS:[ECX+608],0
00405F2E |. 7E 1B |JLE SHORT Ekd5.00405F4B
00405F30 |. 6A 01 |PUSH 1
00405F32 |. 6A 01 |PUSH 1
00405F34 |. 6A 41 |PUSH 41 防御特殊攻击
00405F36 |. 6A 31 |PUSH 31 致命一击攻击
00405F38 |. 8B4D F8 |MOV ECX,DWORD PTR SS:[EBP-8]
00405F3B |. E8 58940C00 |CALL Ekd5.004CF398
00405F40 |. 85C0 |TEST EAX,EAX
00405F42 |. 74 07 |JE SHORT Ekd5.00405F4B
00405F44 |. 8B55 D8 |MOV EDX,DWORD PTR SS:[EBP-28]
00405F47 |. 33C9 |XOR ECX,ECX
00405F49 |. 890A |MOV DWORD PTR DS:[EDX],ECX
00405F4B |> 8B55 D8 |MOV EDX,DWORD PTR SS:[EBP-28]
00405F4E |. 8B02 |MOV EAX,DWORD PTR DS:[EDX]
00405F50 |. 85C0 |TEST EAX,EAX
00405F52 |. 0F84 E1000000 |JE Ekd5.00406039
00405F58 |. 8945 DC |MOV DWORD PTR SS:[EBP-24],EAX
00405F5B |. 8B4D E0 |MOV ECX,DWORD PTR SS:[EBP-20]
00405F5E |. E8 DDC80600 |CALL Ekd5.00472840
00405F63 |. 8945 D4 |MOV DWORD PTR SS:[EBP-2C],EAX
00405F66 |. 8B4D F8 |MOV ECX,DWORD PTR SS:[EBP-8]
00405F69 |. E8 A49D0C00 |CALL Ekd5.004CFD12
00405F6E |. 85C0 |TEST EAX,EAX
00405F70 |. 74 07 |JE SHORT Ekd5.00405F79
00405F72 |. 8B45 D4 |MOV EAX,DWORD PTR SS:[EBP-2C]
00405F75 |. 85C0 |TEST EAX,EAX
00405F77 |. 75 26 |JNZ SHORT Ekd5.00405F9F
00405F79 |> FF75 F4 |PUSH DWORD PTR SS:[EBP-C]
00405F7C |. FF75 FC |PUSH DWORD PTR SS:[EBP-4]
00405F7F |. 8B4D F8 |MOV ECX,DWORD PTR SS:[EBP-8]
00405F82 |. E8 0B9C0C00 |CALL Ekd5.004CFB92
00405F87 |. 84C0 |TEST AL,AL
00405F89 |. 75 48 |JNZ SHORT Ekd5.00405FD3
00405F8B |. 8B4D E0 |MOV ECX,DWORD PTR SS:[EBP-20]
00405F8E |. E8 F3A20C00 |CALL Ekd5.004D0286
00405F93 |. 3B45 DC |CMP EAX,DWORD PTR SS:[EBP-24]
00405F96 |. 73 3B |JNB SHORT Ekd5.00405FD3
00405F98 |. 8B55 D8 |MOV EDX,DWORD PTR SS:[EBP-28]
00405F9B |. 8902 |MOV DWORD PTR DS:[EDX],EAX
00405F9D |. EB 34 |JMP SHORT Ekd5.00405FD3
00405F9F |> 3B45 DC |CMP EAX,DWORD PTR SS:[EBP-24]
00405FA2 |. 73 05 |JNB SHORT Ekd5.00405FA9
00405FA4 |. 8945 DC |MOV DWORD PTR SS:[EBP-24],EAX
00405FA7 |. EB 13 |JMP SHORT Ekd5.00405FBC
00405FA9 |> 8B4D E0 |MOV ECX,DWORD PTR SS:[EBP-20]
00405FAC |. E8 D5A20C00 |CALL Ekd5.004D0286
00405FB1 |. 3945 DC |CMP DWORD PTR SS:[EBP-24],EAX
00405FB4 |. 72 06 |JB SHORT Ekd5.00405FBC
00405FB6 |. 8B4D D4 |MOV ECX,DWORD PTR SS:[EBP-2C]
00405FB9 |. 894D DC |MOV DWORD PTR SS:[EBP-24],ECX
00405FBC |> 8B4D DC |MOV ECX,DWORD PTR SS:[EBP-24]
00405FBF |. 8B55 FC |MOV EDX,DWORD PTR SS:[EBP-4]
00405FC2 |. 8B45 F4 |MOV EAX,DWORD PTR SS:[EBP-C]
00405FC5 |. 898C90 540200>|MOV DWORD PTR DS:[EAX+EDX*4+254],ECX
00405FCC |. 33C9 |XOR ECX,ECX
00405FCE |. 8B55 D8 |MOV EDX,DWORD PTR SS:[EBP-28]
00405FD1 |. 890A |MOV DWORD PTR DS:[EDX],ECX
00405FD3 |> 8B55 FC |MOV EDX,DWORD PTR SS:[EBP-4]
00405FD6 |. 8B45 F4 |MOV EAX,DWORD PTR SS:[EBP-C]
00405FD9 |. 8B8C90 540200>|MOV ECX,DWORD PTR DS:[EAX+EDX*4+254]
00405FE0 |. 85C9 |TEST ECX,ECX
00405FE2 |. 75 07 |JNZ SHORT Ekd5.00405FEB
00405FE4 |. 8B55 D8 |MOV EDX,DWORD PTR SS:[EBP-28]
00405FE7 |. 390A |CMP DWORD PTR DS:[EDX],ECX
00405FE9 |. 74 4E |JE SHORT Ekd5.00406039
00405FEB |> 894D DC |MOV DWORD PTR SS:[EBP-24],ECX
00405FEE |. 8B4D F8 |MOV ECX,DWORD PTR SS:[EBP-8]
00405FF1 |. E8 49A10300 |CALL Ekd5.0044013F
00405FF6 |. 85C0 |TEST EAX,EAX
00405FF8 |. 74 3F |JE SHORT Ekd5.00406039
00405FFA |. 8945 F0 |MOV DWORD PTR SS:[EBP-10],EAX
00405FFD |. 8B4D F8 |MOV ECX,DWORD PTR SS:[EBP-8]
00406000 |. E8 85120000 |CALL Ekd5.0040728A
00406005 |. 50 |PUSH EAX
00406006 |. FF75 F0 |PUSH DWORD PTR SS:[EBP-10]
00406009 |. E8 86960C00 |CALL Ekd5.004CF694
0040600E |. 3945 D4 |CMP DWORD PTR SS:[EBP-2C],EAX
00406011 |. 77 04 |JA SHORT Ekd5.00406017
00406013 |. 33C0 |XOR EAX,EAX
00406015 |. EB 02 |JMP SHORT Ekd5.00406019
00406017 |> B0 01 |MOV AL,1
00406019 |> 0145 DC |ADD DWORD PTR SS:[EBP-24],EAX
0040601C |. 8B4D DC |MOV ECX,DWORD PTR SS:[EBP-24]
0040601F |. 3B4D D4 |CMP ECX,DWORD PTR SS:[EBP-2C]
00406022 |. 90 |NOP
00406023 |. 90 |NOP
00406024 |. 90 |NOP
00406025 |. 90 |NOP
00406026 |. 90 |NOP
00406027 |. 90 |NOP
00406028 |. 73 02 |JNB SHORT Ekd5.0040602C
0040602A |. 8BC8 |MOV ECX,EAX
0040602C |> 8B55 FC |MOV EDX,DWORD PTR SS:[EBP-4]
0040602F |. 8B45 F4 |MOV EAX,DWORD PTR SS:[EBP-C]
00406032 |. 898C90 540200>|MOV DWORD PTR DS:[EAX+EDX*4+254],ECX
00406039 |> FF75 FC |PUSH DWORD PTR SS:[EBP-4]
0040603C |. 8B4D F4 |MOV ECX,DWORD PTR SS:[EBP-C]
0040603F |. E8 5FD7FFFF |CALL Ekd5.004037A3
00406044 |. 8B4D F4 |MOV ECX,DWORD PTR SS:[EBP-C]
00406047 |. 8B91 28040000 |MOV EDX,DWORD PTR DS:[ECX+428]
0040604D |. 3BC2 |CMP EAX,EDX
0040604F |. 77 05 |JA SHORT Ekd5.00406056
00406051 |. 8955 E8 |MOV DWORD PTR SS:[EBP-18],EDX
00406054 |. EB 03 |JMP SHORT Ekd5.00406059
00406056 |> 8945 E8 |MOV DWORD PTR SS:[EBP-18],EAX
00406059 |> 8B4D F4 |MOV ECX,DWORD PTR SS:[EBP-C]
0040605C |. 8B45 E8 |MOV EAX,DWORD PTR SS:[EBP-18]
0040605F |. 8981 28040000 |MOV DWORD PTR DS:[ECX+428],EAX
00406065 |. FF75 FC |PUSH DWORD PTR SS:[EBP-4] ; /Arg1
00406068 |. E8 1FD8FFFF |CALL Ekd5.0040388C ; \Ekd5.0040388C
0040606D |. 8B4D F4 |MOV ECX,DWORD PTR SS:[EBP-C]
00406070 |. 0181 2C040000 |ADD DWORD PTR DS:[ECX+42C],EAX
00406076 |. FF75 FC |PUSH DWORD PTR SS:[EBP-4] ; /Arg2
00406079 |. 51 |PUSH ECX ; |Arg1
0040607A |. E8 6F480200 |CALL Ekd5.0042A8EE ; \Ekd5.0042A8EE
0040607F |. FF75 FC |PUSH DWORD PTR SS:[EBP-4] ; /Arg1
00406082 |. 8B4D F4 |MOV ECX,DWORD PTR SS:[EBP-C] ; |
00406085 |. E8 00DAFFFF |CALL Ekd5.00403A8A ; \Ekd5.00403A8A
0040608A |. 8B55 FC |MOV EDX,DWORD PTR SS:[EBP-4]
0040608D |. 8B4D F4 |MOV ECX,DWORD PTR SS:[EBP-C]
00406090 |. 898491 300400>|MOV DWORD PTR DS:[ECX+EDX*4+430],EAX
00406097 |. 0FB64411 10 |MOVZX EAX,BYTE PTR DS:[ECX+EDX+10]
0040609C |. 05 C58E5000 |ADD EAX,Ekd5.00508EC5
004060A1 |. 8038 FF |CMP BYTE PTR DS:[EAX],0FF
004060A4 |. 74 02 |JE SHORT Ekd5.004060A8
004060A6 |. FE00 |INC BYTE PTR DS:[EAX]
004060A8 |> 52 |PUSH EDX ; /Arg2
004060A9 |. 51 |PUSH ECX ; |Arg1
004060AA |. E8 BE480200 |CALL Ekd5.0042A96D ; \Ekd5.0042A96D
004060AF |.^ E9 68FDFFFF \JMP Ekd5.00405E1C
004060B4 |> 8B4D F4 MOV ECX,DWORD PTR SS:[EBP-C]
004060B7 |. E8 1F4A0200 CALL Ekd5.0042AADB
004060BC |. E8 28020300 CALL Ekd5.004362E9
004060C1 |. C9 LEAVE
004060C2 \. C3 RETN
人物成长(这个不知道是5.几的了)
004072FC /$ 55 push ebp
004072FD |. 8BEC mov ebp,esp
004072FF |. 83EC 0C sub esp,0xC
00407302 |. 894D F8 mov [local.2],ecx
00407305 |. C645 FC 00 mov byte ptr ss:[ebp-0x4],0x0
00407309 |. 837D 08 04 cmp [arg.1],0x4
0040730D |. 76 07 jbe XEkd5.00407316
0040730F |. 32C0 xor al,al
00407311 |. E9 88000000 jmp Ekd5.0040739E
00407316 |> 8B45 08 mov eax,[arg.1]
00407319 |. 8945 F4 mov [local.3],eax
0040731C |. 837D F4 04 cmp [local.3],0x4
00407320 |. 77 41 ja XEkd5.00407363
00407322 |. 8B4D F4 mov ecx,[local.3]
00407325 |. FF248D A47340>jmp dword ptr ds:[ecx*4+0x4073A4]
0040732C |> 8B55 F8 mov edx,[local.2]
0040732F |. 8A42 21 mov al,byte ptr ds:[edx+0x21]
00407332 |. 8845 FC mov byte ptr ss:[ebp-0x4],al
00407335 |. EB 30 jmp XEkd5.00407367
00407337 |> 8B4D F8 mov ecx,[local.2]
0040733A |. 8A51 22 mov dl,byte ptr ds:[ecx+0x22]
0040733D |. 8855 FC mov byte ptr ss:[ebp-0x4],dl
00407340 |. EB 25 jmp XEkd5.00407367
00407342 |> 8B45 F8 mov eax,[local.2]
00407345 |. 8A48 23 mov cl,byte ptr ds:[eax+0x23]
00407348 |. 884D FC mov byte ptr ss:[ebp-0x4],cl
0040734B |. EB 1A jmp XEkd5.00407367
0040734D |> 8B55 F8 mov edx,[local.2]
00407350 |. 8A42 24 mov al,byte ptr ds:[edx+0x24]
00407353 |. 8845 FC mov byte ptr ss:[ebp-0x4],al
00407356 |. EB 0F jmp XEkd5.00407367
00407358 |> 8B4D F8 mov ecx,[local.2]
0040735B |. 8A51 25 mov dl,byte ptr ds:[ecx+0x25]
0040735E |. 8855 FC mov byte ptr ss:[ebp-0x4],dl
00407361 |. EB 04 jmp XEkd5.00407367
00407363 |> 32C0 xor al,al
00407365 |. EB 37 jmp XEkd5.0040739E
00407367 |> 8B45 FC mov eax,[local.1] local.1,ebp-0x4是曹操武力41(以曹操举例)。一一判断,是否比90,70,50大,然后对号入座。
0040736A |. 25 FF000000 and eax,0xFF
0040736F |. 83F8 2D cmp eax,0x2D
00407372 |. 7C 04 jl XEkd5.00407378
00407374 |. B0 04 mov al,0x4
00407376 |. EB 26 jmp XEkd5.0040739E
00407378 |> 8B4D FC mov ecx,[local.1]
0040737B |. 81E1 FF000000 and ecx,0xFF
00407381 |. 83F9 23 cmp ecx,0x23
00407384 |. 7C 04 jl XEkd5.0040738A
00407386 |. B0 03 mov al,0x3
00407388 |. EB 14 jmp XEkd5.0040739E
0040738A |> 8B55 FC mov edx,[local.1]
0040738D |. 81E2 FF000000 and edx,0xFF
00407393 |. 83FA 19 cmp edx,0x19
00407396 |. 7C 04 jl XEkd5.0040739C
00407398 |. B0 02 mov al,0x2
0040739A |. EB 02 jmp XEkd5.0040739E
0040739C |> B0 01 mov al,0x1
0040739E |> 8BE5 mov esp,ebp
004073A0 |. 5D pop ebp
004073A1 \. C2 0400 retn 0x4
[
本帖最后由 古月新风 于 2015-6-5 17:24 编辑
]
作者:
古月新风
时间:
2015-6-5 17:10
自定义函数:主动连击/双枪攻击
00405CB0 /$ 55 PUSH EBP
00405CB1 |. 8BEC MOV EBP,ESP
00405CB3 |. 83EC 10 SUB ESP,10
00405CB6 |. 894D F4 MOV DWORD PTR SS:[EBP-C],ECX
00405CB9 |. 6A 03 PUSH 3 ; /Arg1 = 00000003
00405CBB |. 8B49 0C MOV ECX,DWORD PTR DS:[ECX+C] ; |
00405CBE |. E8 FE660300 CALL Ekd5.0043C3C1 ; \Ekd5.0043C3C1
00405CC3 |. 8945 F8 MOV DWORD PTR SS:[EBP-8],EAX
00405CC6 |. 8B45 F4 MOV EAX,DWORD PTR SS:[EBP-C]
00405CC9 |. 33C9 XOR ECX,ECX
00405CCB |. 8A48 01 MOV CL,BYTE PTR DS:[EAX+1]
00405CCE |. E8 26050000 CALL Ekd5.004061F9
00405CD3 |. 6A 03 PUSH 3 ; /Arg1 = 00000003
00405CD5 |. E8 E7660300 CALL Ekd5.0043C3C1 ; \Ekd5.0043C3C1
00405CDA |. 8945 FC MOV DWORD PTR SS:[EBP-4],EAX
00405CDD |. 8B55 F4 MOV EDX,DWORD PTR SS:[EBP-C]
00405CE0 |. 8B4A 08 MOV ECX,DWORD PTR DS:[EDX+8]
00405CE3 |. 894D F0 MOV DWORD PTR SS:[EBP-10],ECX
00405CE6 |. 6A 01 PUSH 1
00405CE8 |. 6A 01 PUSH 1
00405CEA |. 6A 42 PUSH 42 宝物属性
00405CEC |. 6A 34 PUSH 34 人物属性
00405CEE |. E8 A5960C00 CALL Ekd5.004CF398
00405CF3 |. 85C0 TEST EAX,EAX
00405CF5 |. 74 04 JE SHORT Ekd5.00405CFB
00405CF7 |. B0 64 MOV AL,64
00405CF9 |. EB 0B JMP SHORT Ekd5.00405D06
00405CFB |> FF75 F8 PUSH DWORD PTR SS:[EBP-8] ; /Arg2
00405CFE |. FF75 FC PUSH DWORD PTR SS:[EBP-4] ; |Arg1
00405D01 |. E8 04000000 CALL Ekd5.00405D0A ; \Ekd5.00405D0A
00405D06 |> 8BE5 MOV ESP,EBP
00405D08 |. 5D POP EBP
00405D09 \. C3 RETN
自定义函数:MP攻击
0044013F /$ 55 PUSH EBP
00440140 |. 8BEC MOV EBP,ESP
00440142 |. 6A 00 PUSH 0
00440144 |. 6A 01 PUSH 1
00440146 |. 6A 6E PUSH 6E 宝物特效
00440148 |. 6A 52 PUSH 52 人物/兵种特效
0044014A |. E8 49F20800 CALL Ekd5.004CF398
0044014F |. 5D POP EBP
00440150 \. C3 RETN
自定义函数:众志成城
0043CAF2 /$ 55 PUSH EBP
0043CAF3 |. 8BEC MOV EBP,ESP
0043CAF5 |. 51 PUSH ECX
0043CAF6 |. 6A 00 PUSH 0
0043CAF8 |. 6A 00 PUSH 0
0043CAFA |. 51 PUSH ECX
0043CAFB |. E8 109CFCFF CALL Ekd5.00406710
0043CB00 |. 50 PUSH EAX
0043CB01 |. 6A 00 PUSH 0
0043CB03 |. 81EC 98060000 SUB ESP,698
0043CB09 |. 8D8D 50F9FFFF LEA ECX,DWORD PTR SS:[EBP-6B0]
0043CB0F |. 6A 00 PUSH 0 ; /Arg1 = 00000000
0043CB11 |. E8 84010000 CALL Ekd5.0043CC9A ; \Ekd5.0043CC9A
0043CB16 |. 8B4D F0 MOV ECX,DWORD PTR SS:[EBP-10]
0043CB19 |. 8A51 04 MOV DL,BYTE PTR DS:[ECX+4]
0043CB1C |. 8815 282C4B00 MOV BYTE PTR DS:[4B2C28],DL
0043CB22 |. EB 03 JMP SHORT Ekd5.0043CB27
0043CB24 |> FF45 E8 /INC DWORD PTR SS:[EBP-18]
0043CB27 |> 8B4D E8 MOV ECX,DWORD PTR SS:[EBP-18]
0043CB2A |. 83F9 73 |CMP ECX,73
0043CB2D |. 73 73 |JNB SHORT Ekd5.0043CBA2
0043CB2F |. E8 C596FCFF |CALL Ekd5.004061F9
0043CB34 |. 3B4D F0 |CMP ECX,DWORD PTR SS:[EBP-10]
0043CB37 |.^ 74 EB |JE SHORT Ekd5.0043CB24
0043CB39 |. E8 52C1FDFF |CALL Ekd5.00418C90
0043CB3E |. 3C 02 |CMP AL,2
0043CB40 |.^ 75 E2 |JNZ SHORT Ekd5.0043CB24
0043CB42 |. 894D FC |MOV DWORD PTR SS:[EBP-4],ECX
0043CB45 |. E8 459AFCFF |CALL Ekd5.0040658F
0043CB4A |. 6A 00 |PUSH 0
0043CB4C |. 6A 01 |PUSH 1
0043CB4E |. 6A 64 |PUSH 64
0043CB50 |. 6A 3C |PUSH 3C
0043CB52 |. E8 41280900 |CALL Ekd5.004CF398
0043CB57 |. 84C0 |TEST AL,AL
0043CB59 |.^ 74 C9 |JE SHORT Ekd5.0043CB24
0043CB5B |. 50 |PUSH EAX
0043CB5C |. 8B45 EC |MOV EAX,DWORD PTR SS:[EBP-14]
0043CB5F |. 807D E8 23 |CMP BYTE PTR SS:[EBP-18],23
0043CB63 |. 72 03 |JB SHORT Ekd5.0043CB68
0043CB65 |. 83F0 01 |XOR EAX,1
0043CB68 |> FF75 F0 |PUSH DWORD PTR SS:[EBP-10] ; /Arg3
0043CB6B |. 50 |PUSH EAX ; |Arg2
0043CB6C |. FF75 FC |PUSH DWORD PTR SS:[EBP-4] ; |Arg1
0043CB6F |. E8 D23FFEFF |CALL Ekd5.00420B46 ; \Ekd5.00420B46
0043CB74 |. 5A |POP EDX
0043CB75 |. 3805 282C4B00 |CMP BYTE PTR DS:[4B2C28],AL
0043CB7B |.^ 75 A7 |JNZ SHORT Ekd5.0043CB24
0043CB7D |. 52 |PUSH EDX
0043CB7E |. 50 |PUSH EAX ; /Arg2
0043CB7F |. FF75 FC |PUSH DWORD PTR SS:[EBP-4] ; |Arg1
0043CB82 |. E8 833FFEFF |CALL Ekd5.00420B0A ; \Ekd5.00420B0A
0043CB87 |. 59 |POP ECX
0043CB88 |. 0FAFD1 |IMUL EDX,ECX
0043CB8B |. 8B4D FC |MOV ECX,DWORD PTR SS:[EBP-4]
0043CB8E |. E8 7D9BFCFF |CALL Ekd5.00406710
0043CB93 |. 3845 EC |CMP BYTE PTR SS:[EBP-14],AL
0043CB96 |. 75 05 |JNZ SHORT Ekd5.0043CB9D
0043CB98 |. 0155 F8 |ADD DWORD PTR SS:[EBP-8],EDX
0043CB9B |. EB 03 |JMP SHORT Ekd5.0043CBA0
0043CB9D |> 2955 F8 |SUB DWORD PTR SS:[EBP-8],EDX
0043CBA0 |>^ EB 82 \JMP SHORT Ekd5.0043CB24
0043CBA2 |> 837D F8 00 CMP DWORD PTR SS:[EBP-8],0
0043CBA6 |. 74 21 JE SHORT Ekd5.0043CBC9
0043CBA8 |. 7F 06 JG SHORT Ekd5.0043CBB0
0043CBAA |. F75D F8 NEG DWORD PTR SS:[EBP-8]
0043CBAD |. FF45 F4 INC DWORD PTR SS:[EBP-C]
0043CBB0 |> FF75 08 PUSH DWORD PTR SS:[EBP+8]
0043CBB3 |. FF75 F8 PUSH DWORD PTR SS:[EBP-8]
0043CBB6 |. E8 D92A0900 CALL Ekd5.004CF694
0043CBBB |. 837D F4 01 CMP DWORD PTR SS:[EBP-C],1
0043CBBF |. 75 05 JNZ SHORT Ekd5.0043CBC6
0043CBC1 |. 2945 08 SUB DWORD PTR SS:[EBP+8],EAX
0043CBC4 |. EB 03 JMP SHORT Ekd5.0043CBC9
0043CBC6 |> 0145 08 ADD DWORD PTR SS:[EBP+8],EAX
0043CBC9 |> 8D8D 50F9FFFF LEA ECX,DWORD PTR SS:[EBP-6B0]
0043CBCF |. 6A 01 PUSH 1 ; /Arg1 = 00000001
0043CBD1 |. E8 C4000000 CALL Ekd5.0043CC9A ; \Ekd5.0043CC9A
0043CBD6 |. FF75 08 PUSH DWORD PTR SS:[EBP+8] ; /Arg2
0043CBD9 |. FF75 F0 PUSH DWORD PTR SS:[EBP-10] ; |Arg1
0043CBDC |. E8 9BEA0100 CALL Ekd5.0045B67C ; \Ekd5.0045B67C
0043CBE1 |. 83F8 00 CMP EAX,0
0043CBE4 |. 7F 05 JG SHORT Ekd5.0043CBEB
0043CBE6 |. B8 01000000 MOV EAX,1
0043CBEB |> 8BE5 MOV ESP,EBP
0043CBED |. 5D POP EBP
0043CBEE \. C2 0400 RETN 4
自定义函数:鬼神之勇
0045B67C /$ 55 PUSH EBP
0045B67D |. 8BEC MOV EBP,ESP
0045B67F |. 83EC 0C SUB ESP,0C
0045B682 |. 8B4D 08 MOV ECX,DWORD PTR SS:[EBP+8]
0045B685 |. E8 05AFFAFF CALL Ekd5.0040658F
0045B68A |. 894D FC MOV DWORD PTR SS:[EBP-4],ECX
0045B68D |. 6A 00 PUSH 0
0045B68F |. 6A 00 PUSH 0
0045B691 |. 6A 6D PUSH 6D
0045B693 |. 6A 51 PUSH 51
0045B695 |. E8 FE3C0700 CALL Ekd5.004CF398
0045B69A |. 85C0 TEST EAX,EAX
0045B69C |. 74 3C JE SHORT Ekd5.0045B6DA
0045B69E |. 8945 F4 MOV DWORD PTR SS:[EBP-C],EAX
0045B6A1 |. 8B4D 08 MOV ECX,DWORD PTR SS:[EBP+8]
0045B6A4 |. E8 DD4B0700 CALL Ekd5.004D0286
0045B6A9 |. 8945 F8 MOV DWORD PTR SS:[EBP-8],EAX
0045B6AC |. 8B4D FC MOV ECX,DWORD PTR SS:[EBP-4]
0045B6AF |. E8 AFBBFAFF CALL Ekd5.00407263
0045B6B4 |. 8BC8 MOV ECX,EAX
0045B6B6 |. 2B45 F8 SUB EAX,DWORD PTR SS:[EBP-8]
0045B6B9 |. 6BC0 64 IMUL EAX,EAX,64
0045B6BC |. 33D2 XOR EDX,EDX
0045B6BE |. F7F9 IDIV ECX
0045B6C0 |. D1E8 SHR EAX,1
0045B6C2 |. 85C0 TEST EAX,EAX
0045B6C4 |. 74 14 JE SHORT Ekd5.0045B6DA
0045B6C6 |. 3B45 F4 CMP EAX,DWORD PTR SS:[EBP-C]
0045B6C9 |. 76 03 JBE SHORT Ekd5.0045B6CE
0045B6CB |. 8B45 F4 MOV EAX,DWORD PTR SS:[EBP-C]
0045B6CE |> 50 PUSH EAX
0045B6CF |. FF75 0C PUSH DWORD PTR SS:[EBP+C]
0045B6D2 |. E8 BD3F0700 CALL Ekd5.004CF694
0045B6D7 |. 0145 0C ADD DWORD PTR SS:[EBP+C],EAX
0045B6DA |> 8B45 0C MOV EAX,DWORD PTR SS:[EBP+C]
0045B6DD |. 8BE5 MOV ESP,EBP
0045B6DF |. 5D POP EBP
0045B6E0 \. C2 0800 RETN 8
致命一击攻击
0040665C /$ 55 PUSH EBP
0040665D |. 8BEC MOV EBP,ESP
0040665F |. 6A 01 PUSH 1
00406661 |. 6A 01 PUSH 1
00406663 |. 6A 31 PUSH 31
00406665 |. 6A 33 PUSH 33
00406667 |. E8 2C8D0C00 CALL Ekd5.004CF398
0040666C |. 8BE5 MOV ESP,EBP
0040666E |. 5D POP EBP
0040666F \. C3 RETN
一夫当关
00478EAB /$ 55 PUSH EBP
00478EAC |. 8BEC MOV EBP,ESP
00478EAE |. 6A 00 PUSH 0
00478EB0 |. 6A 00 PUSH 0
00478EB2 |. 6A 69 PUSH 69
00478EB4 |. 6A 47 PUSH 47
00478EB6 |. E8 DD640500 CALL Ekd5.004CF398
00478EBB |. 85C0 TEST EAX,EAX
00478EBD |. 74 40 JE SHORT Ekd5.00478EFF
00478EBF |. 50 PUSH EAX
00478EC0 |. 8B4D 0C MOV ECX,DWORD PTR SS:[EBP+C]
00478EC3 |. E8 48D8F8FF CALL Ekd5.00406710
00478EC8 |. 3C 01 CMP AL,1
00478ECA |. 75 04 JNZ SHORT Ekd5.00478ED0
00478ECC |. 6A 04 PUSH 4
00478ECE |. EB 02 JMP SHORT Ekd5.00478ED2
00478ED0 |> 6A 05 PUSH 5
00478ED2 |> 8B4D 0C MOV ECX,DWORD PTR SS:[EBP+C]
00478ED5 |. E8 A7750500 CALL Ekd5.004D0481
00478EDA |. 3C 00 CMP AL,0
00478EDC |. 74 13 JE SHORT Ekd5.00478EF1
00478EDE |. 83F8 01 CMP EAX,1
00478EE1 |. 75 1C JNZ SHORT Ekd5.00478EFF
00478EE3 |. 8B45 0C MOV EAX,DWORD PTR SS:[EBP+C]
00478EE6 |. 66:3B48 06 CMP CX,WORD PTR DS:[EAX+6]
00478EEA |. 74 05 JE SHORT Ekd5.00478EF1
00478EEC |. 3A50 04 CMP DL,BYTE PTR DS:[EAX+4]
00478EEF |. 75 0E JNZ SHORT Ekd5.00478EFF
00478EF1 |> FF75 08 PUSH DWORD PTR SS:[EBP+8]
00478EF4 |. FF75 FC PUSH DWORD PTR SS:[EBP-4]
00478EF7 |. E8 98670500 CALL Ekd5.004CF694
00478EFC |. 0145 08 ADD DWORD PTR SS:[EBP+8],EAX
00478EFF |> 8B45 08 MOV EAX,DWORD PTR SS:[EBP+8]
00478F02 |. 8BE5 MOV ESP,EBP
00478F04 |. 5D POP EBP
00478F05 \. C2 0800 RETN 8
怀恨攻击
00478F08 /$ 55 PUSH EBP
00478F09 |. 8BEC MOV EBP,ESP
00478F0B |. 6A 00 PUSH 0
00478F0D |. 6A 01 PUSH 1
00478F0F |. 6A 6B PUSH 6B
00478F11 |. 6A 2C PUSH 2C
00478F13 |. E8 80640500 CALL Ekd5.004CF398
00478F18 |. 85C0 TEST EAX,EAX
00478F1A |. 74 1C JE SHORT Ekd5.00478F38
00478F1C |. 8B55 08 MOV EDX,DWORD PTR SS:[EBP+8]
00478F1F |. 0FB64A 04 MOVZX ECX,BYTE PTR DS:[EDX+4]
00478F23 |. 81C1 C58E5000 ADD ECX,Ekd5.00508EC5
00478F29 |. 0FB609 MOVZX ECX,BYTE PTR DS:[ECX]
00478F2C |. 0FAFC1 IMUL EAX,ECX
00478F2F |. FF75 0C PUSH DWORD PTR SS:[EBP+C]
00478F32 |. 50 PUSH EAX
00478F33 |. E8 5C670500 CALL Ekd5.004CF694
00478F38 |> C9 LEAVE
00478F39 \. C2 0800 RETN 8
作者:
古月新风
时间:
2015-6-5 17:13
43C3C1读取五维之一的公式(此项中包含唯我独尊等)
0043C3C1 /$ 55 push ebp
0043C3C2 |. 8BEC mov ebp,esp
0043C3C4 |. 51 push ecx
0043C3C5 |. 6A 00 push 0x0
0043C3C7 |. 6A 00 push 0x0
0043C3C9 |. E8 C1A1FCFF call Ekd5.0040658F
0043C3CE |. 51 push ecx
0043C3CF |. 6A 01 push 0x1
0043C3D1 |. 6A 01 push 0x1
0043C3D3 |. 6A 61 push 0x61 唯我独尊
0043C3D5 |. 6A 39 push 0x39
0043C3D7 |. E8 BC2F0900 call Ekd5.004CF398
0043C3DC |. 8B55 F8 mov edx,[local.2]
0043C3DF |. 85C0 test eax,eax
0043C3E1 |. 75 11 jnz XEkd5.0043C3F4
0043C3E3 |. 8345 F8 04 add [local.2],0x4
0043C3E7 |. 8B55 08 mov edx,[arg.1]
0043C3EA |. EB 08 jmp XEkd5.0043C3F4
0043C3EC |> 8B55 F8 /mov edx,[local.2]
0043C3EF |. 80FA 05 |cmp dl,0x5
0043C3F2 |. 73 29 |jnb XEkd5.0043C41D
0043C3F4 |> 8B4D FC mov ecx,[local.1]
0043C3F7 |. FF1495 510144>|call dword ptr ds:[edx*4+0x440151]
0043C3FE |. 837D 08 00 |cmp [arg.1],0x0
0043C402 |. 75 0C |jnz XEkd5.0043C410
0043C404 |. 50 |push eax
0043C405 |. 8B4D FC |mov ecx,[local.1]
0043C408 |. E8 98BCFDFF |call Ekd5.004180A5
0043C40D |. 59 |pop ecx
0043C40E |. 03C1 |add eax,ecx
0043C410 |> 3945 F4 |cmp [local.3],eax
0043C413 |. 7D 03 |jge XEkd5.0043C418
0043C415 |. 8945 F4 |mov [local.3],eax
0043C418 |> FF45 F8 |inc [local.2]
0043C41B |.^ EB CF \jmp XEkd5.0043C3EC
0043C41D |> 8B4D F0 mov ecx,[local.4]
0043C420 |. FF75 FC push [local.1]
0043C423 |. FF75 F4 push [local.3]
0043C426 |. E8 80CA0300 call Ekd5.00478EAB 一夫当关
0043C42B |. 50 push eax
0043C42C |. 8B4D FC mov ecx,[local.1]
0043C42F |. E8 BE060000 call Ekd5.0043CAF2 算众志成城的。
0043C434 |. 8BE5 mov esp,ebp
0043C436 |. 5D pop ebp
0043C437 \. C2 0400 retn 0x4
隐性加能力函数:众志成城
0043CAF2 /$ 55 push ebp
0043CAF3 |. 8BEC mov ebp,esp
0043CAF5 |. 51 push ecx
0043CAF6 |. 6A 00 push 0x0
0043CAF8 |. 6A 00 push 0x0
0043CAFA |. 51 push ecx
0043CAFB |. E8 109CFCFF call Ekd5.00406710
0043CB00 |. 50 push eax
0043CB01 |. 6A 00 push 0x0
0043CB03 |. 81EC 98060000 sub esp,0x698
0043CB09 |. 8D8D 50F9FFFF lea ecx,[local.428]
0043CB0F |. 6A 00 push 0x0
0043CB11 |. E8 84010000 call Ekd5.0043CC9A
0043CB16 |. 8B4D F0 mov ecx,[local.4]
0043CB19 |. 8A51 04 mov dl,byte ptr ds:[ecx+0x4]
0043CB1C |. 8815 282C4B00 mov byte ptr ds:[0x4B2C28],dl
0043CB22 |. EB 03 jmp XEkd5.0043CB27
0043CB24 |> FF45 E8 /inc [local.6]
0043CB27 |> 8B4D E8 mov ecx,[local.6]
0043CB2A |. 83F9 73 |cmp ecx,0x73 不能超过战场人数上限115
0043CB2D |. 73 73 |jnb XEkd5.0043CBA2
0043CB2F |. E8 C596FCFF |call Ekd5.004061F9 栈值转化ecx值
0043CB34 |. 3B4D F0 |cmp ecx,[local.4]
0043CB37 |.^ 74 EB |je XEkd5.0043CB24
0043CB39 |. E8 52C1FDFF |call Ekd5.00418C90
0043CB3E |. 3C 02 |cmp al,0x2
0043CB40 |.^ 75 E2 |jnz XEkd5.0043CB24
0043CB42 |. 894D FC |mov [local.1],ecx
0043CB45 |. E8 459AFCFF |call Ekd5.0040658F
0043CB4A |. 6A 00 |push 0x0
0043CB4C |. 6A 01 |push 0x1
0043CB4E |. 6A 64 |push 0x64 众志成城
0043CB50 |. 6A 3C |push 0x3C
0043CB52 |. E8 41280900 |call Ekd5.004CF398
0043CB57 |. 84C0 |test al,al
0043CB59 |.^ 74 C9 |je XEkd5.0043CB24
0043CB5B |. 50 |push eax
0043CB5C |. 8B45 EC |mov eax,[local.5]
0043CB5F |. 807D E8 23 |cmp byte ptr ss:[ebp-0x18],0x23
0043CB63 |. 72 03 |jb XEkd5.0043CB68
0043CB65 |. 83F0 01 |xor eax,0x1
0043CB68 |> FF75 F0 |push [local.4]
0043CB6B |. 50 |push eax
0043CB6C |. FF75 FC |push [local.1]
0043CB6F |. E8 D23FFEFF |call Ekd5.00420B46
0043CB74 |. 5A |pop edx
0043CB75 |. 3805 282C4B00 |cmp byte ptr ds:[0x4B2C28],al 比较偏移?
0043CB7B |.^ 75 A7 |jnz XEkd5.0043CB24
0043CB7D |. 52 |push edx
0043CB7E |. 50 |push eax
0043CB7F |. FF75 FC |push [local.1]
0043CB82 |. E8 833FFEFF |call Ekd5.00420B0A
0043CB87 |. 59 |pop ecx
0043CB88 |. 0FAFD1 |imul edx,ecx
0043CB8B |. 8B4D FC |mov ecx,[local.1]
0043CB8E |. E8 7D9BFCFF |call Ekd5.00406710
0043CB93 |. 3845 EC |cmp byte ptr ss:[ebp-0x14],al
0043CB96 |. 75 05 |jnz XEkd5.0043CB9D
0043CB98 |. 0155 F8 |add [local.2],edx
0043CB9B |. EB 03 |jmp XEkd5.0043CBA0
0043CB9D |> 2955 F8 |sub [local.2],edx
0043CBA0 |>^ EB 82 \jmp XEkd5.0043CB24
0043CBA2 |> 837D F8 00 cmp [local.2],0x0
0043CBA6 |. 74 21 je XEkd5.0043CBC9
0043CBA8 |. 7F 06 jg XEkd5.0043CBB0
0043CBAA |. F75D F8 neg [local.2]
0043CBAD |. FF45 F4 inc [local.3]
0043CBB0 |> FF75 08 push [arg.1]
0043CBB3 |. FF75 F8 push [local.2]
0043CBB6 |. E8 D92A0900 call Ekd5.004CF694
0043CBBB |. 837D F4 01 cmp [local.3],0x1
0043CBBF |. 75 05 jnz XEkd5.0043CBC6
0043CBC1 |. 2945 08 sub [arg.1],eax 减
0043CBC4 |. EB 03 jmp XEkd5.0043CBC9
0043CBC6 |> 0145 08 add [arg.1],eax 加
0043CBC9 |> 8D8D 50F9FFFF lea ecx,[local.428]
0043CBCF |. 6A 01 push 0x1
0043CBD1 |. E8 C4000000 call Ekd5.0043CC9A
0043CBD6 |. FF75 08 push [arg.1]
0043CBD9 |. FF75 F0 push [local.4]
0043CBDC |. E8 9BEA0100 call Ekd5.0045B67C
0043CBE1 |. 83F8 00 cmp eax,0x0
0043CBE4 |. 7F 05 jg XEkd5.0043CBEB
0043CBE6 |. B8 01000000 mov eax,0x1
0043CBEB |> 8BE5 mov esp,ebp
0043CBED |. 5D pop ebp
0043CBEE \. C2 0400 retn 0x4
获取武将地形
00435991 /$ 55 push ebp
00435992 |. 8BEC mov ebp,esp
00435994 |. 8B45 08 mov eax,[arg.1]
00435997 |. 33C9 xor ecx,ecx
00435999 |. 8A08 mov cl,byte ptr ds:[eax]
0043599B |. 33D2 xor edx,edx
0043599D |. 8A15 2C424B00 mov dl,byte ptr ds:[0x4B422C]
004359A3 |. 3BCA cmp ecx,edx
004359A5 |. 7D 4A jge XEkd5.004359F1
004359A7 |. 8B45 08 mov eax,[arg.1]
004359AA |. 33C9 xor ecx,ecx
004359AC |. 8A48 01 mov cl,byte ptr ds:[eax+0x1]
004359AF |. 33D2 xor edx,edx
004359B1 |. 8A15 2D424B00 mov dl,byte ptr ds:[0x4B422D]
004359B7 |. 3BCA cmp ecx,edx
004359B9 |. 7D 36 jge XEkd5.004359F1
004359BB |. 6A 04 push 0x4
004359BD |. 6A 00 push 0x0
004359BF |. 6A 00 push 0x0
004359C1 |. B9 38EB4A00 mov ecx,Ekd5.004AEB38
004359C6 |. E8 75A00400 call Ekd5.0047FA40
004359CB |. 8B4D 08 mov ecx,[arg.1]
004359CE |. 33D2 xor edx,edx
004359D0 |. 8A11 mov dl,byte ptr ds:[ecx]
004359D2 |. 8D8410 400600>lea eax,dword ptr ds:[eax+edx+0x640]
004359D9 |. 8B4D 08 mov ecx,[arg.1]
004359DC |. 33D2 xor edx,edx
004359DE |. 8A51 01 mov dl,byte ptr ds:[ecx+0x1]
004359E1 |. 33C9 xor ecx,ecx
004359E3 |. 8A0D 2C424B00 mov cl,byte ptr ds:[0x4B422C]
004359E9 |. 0FAFD1 imul edx,ecx
004359EC |. 8A0410 mov al,byte ptr ds:[eax+edx]
004359EF |. EB 02 jmp XEkd5.004359F3
004359F1 |> 0C FF or al,0xFF
004359F3 |> 5D pop ebp
004359F4 \. C3 retn
地形百分数显示
0048E067 0025 337500D3 add byte ptr ds:[0xD3007533],ah
0048E06D D1BE FC000000 sar dword ptr ds:[esi+0xFC],1
0048E073 00B5 D0BEFC00 add byte ptr ss:[ebp+0xFCBED0],dh
0048E079 0000 add byte ptr ds:[eax],al
0048E07B 0025 73000025 add byte ptr ds:[0x25000073],ah
0048E081 34 75 xor al,0x75
0048E083 25 25000000 and eax,0x25
440cc8
2D29 武器,不知道是UE还是OD去了。
2F0B 防具获取经验,不知道是UE还是OD去了。
43f8e8攻击范围?
43f8f8攻击范围?
004CF694攻击范围?
407B02增加特效值
远距攻击
0043F8E8 /$ 55 push ebp
0043F8E9 |. 8BEC mov ebp,esp
0043F8EB |. 51 push ecx
0043F8EC |. E8 9E6CFCFF call Ekd5.0040658F
0043F8F1 |. 51 push ecx
0043F8F2 |. 6A 05 push 0x5
0043F8F4 |. 6A 00 push 0x0
0043F8F6 |. 6A 32 push 0x32
0043F8F8 |. E8 97CEFFFF call Ekd5.0043C794
0043F8FD |. 85C0 test eax,eax
0043F8FF |. 75 39 jnz XEkd5.0043F93A ; 不等于就跳转
0043F901 |. 6A 5A push 0x5A
0043F903 |. 8B4D F8 mov ecx,[local.2]
0043F906 |. E8 FE80FCFF call Ekd5.00407A09
0043F90B |. 85C0 test eax,eax
0043F90D |. 74 04 je XEkd5.0043F913
0043F90F |. B0 0C mov al,0xC
0043F911 |. EB 27 jmp XEkd5.0043F93A
0043F913 |> 6A 48 push 0x48
0043F915 |. 8B4D F8 mov ecx,[local.2]
0043F918 |. E8 EC80FCFF call Ekd5.00407A09
0043F91D |. 85C0 test eax,eax
0043F91F |. 74 04 je XEkd5.0043F925
0043F921 |. B0 0C mov al,0xC
0043F923 |. EB 15 jmp XEkd5.0043F93A
0043F925 |> 8B4D FC mov ecx,[local.1]
0043F928 |. E8 43E6FDFF call Ekd5.0041DF70
0043F92D |. 0FB6C8 movzx ecx,al
0043F930 |. E8 4CBEFDFF call Ekd5.0041B781
0043F935 |. E8 66000100 call Ekd5.0044F9A0
0043F93A |> 0FB6C0 movzx eax,al
0043F93D |. 90 nop
0043F93E |. 8BE5 mov esp,ebp
0043F940 |. 5D pop ebp
0043F941 \. C3 retn
7级武器自动增加:
0042013D |> \80FA 07 CMP DL,7
00420140 |. 72 43 JB SHORT Ekd5.00420185
00420142 |. 3C 33 CMP AL,33
00420144 |. 75 0A JNZ SHORT Ekd5.00420150
00420146 |. 80F9 04 CMP CL,4
00420149 |. 75 21 JNZ SHORT Ekd5.0042016C
0042014B |. 80C1 03 ADD CL,3
0042014E |. EB 1C JMP SHORT Ekd5.0042016C
00420150 |> 3C 32 CMP AL,32
00420152 |. 75 04 JNZ SHORT Ekd5.00420158
00420154 |. D1E1 SHL ECX,1
00420156 |. EB 14 JMP SHORT Ekd5.0042016C
00420158 |> 3C 36 CMP AL,36
0042015A |. 74 08 JE SHORT Ekd5.00420164
0042015C |. 3C 42 CMP AL,42
0042015E |. 74 04 JE SHORT Ekd5.00420164
00420160 |. 3C 46 CMP AL,46
00420162 |. 75 03 JNZ SHORT Ekd5.00420167
00420164 |> 41 INC ECX
00420165 |. EB 05 JMP SHORT Ekd5.0042016C
00420167 |> 6BC9 03 IMUL ECX,ECX,3
0042016A |. D1E9 SHR ECX,1
0042016C |> 80FA 0A CMP DL,0A
0042016F |. 72 14 JB SHORT Ekd5.00420185
00420171 |. 3C 59 CMP AL,59
00420173 |. 72 03 JB SHORT Ekd5.00420178
00420175 |. 83E8 12 SUB EAX,12
00420178 |> 83E8 1A SUB EAX,1A
0042017B |. 8A80 64234600 MOV AL,BYTE PTR DS:[EAX+462364]
00420181 |. 3C FE CMP AL,0FE
00420183 |. 75 02 JNZ SHORT Ekd5.00420187
00420185 |> 8BC1 MOV EAX,ECX
00420187 |> C9 LEAVE
00420188 \. C3 RETN
[
本帖最后由 古月新风 于 2015-6-5 17:16 编辑
]
作者:
a117398902
时间:
2015-6-5 18:40
标题:
回复 #7 古月新风 的帖子
一些特效代码整段都被你揪出来了........,我只是单纯的照着旧址找出一些地址而已,对汇编什么都不懂,闲着无聊就翻下毅大的帖子来看看下而已,最近在大海捞针式的捞策略命中上限的地址和命中后直接击退的地址(原版海啸、晕眩),都不知道是不是策略命中率上限的计算方式被重写了......捞几天无果
作者:
冰麒麟
时间:
2015-6-6 12:08
标题:
回复 #8 a117398902 的帖子
之前帮别人改6.0引擎找过一下。
0043B6F3 策略命中函数
0043BA07应该是各策略命中上限
直接击退的地址在0043C00F函数里
0043C0BB |> \3C 09 CMP AL,9 ‘海啸编号
0043C0BD |. 74 04 JE SHORT Ekd5.0043C0C3
0043C0BF |. 3C 15 CMP AL,15 ’晕眩编号
0043C0C1 |. 75 0B JNZ SHORT Ekd5.0043C0CE
作者:
古月新风
时间:
2015-6-6 16:42
标题:
回复 #8 a117398902 的帖子
但你会编程序啊……很牛。我想用6.0引擎的,想一键调整血量设置。
楼上冰大已经完美回答了问题。
作者:
a117398902
时间:
2015-6-6 18:21
标题:
回复 #10 古月新风 的帖子
这不需要会编程序,你百度下CheatMaker教程,这款软件是专门提供给只要你懂中文来了解各控件的使用方法和一些参数的设定,亲!你就会知道做个修改器出来是很容易的(前提是你要知道你修改的东西的准确地址),这款软件N年前有人在设计区提供过...........我也是最近无聊来重温CCZ翻旧帖看到的
作者:
a117398902
时间:
2015-6-6 18:47
标题:
回复 #9 冰麒麟 的帖子
万分感谢,今晚下班后测试下
作者:
dnts0318
时间:
2015-7-20 23:24
这个厉害,我想问下6.06.1霸气之类策略怎样获得武器经验。文官物理攻击正常是没武器经验,怎样改成有经验
欢迎光临 轩辕春秋文化论坛 (http://xycq.org.cn/forum/)
Powered by Discuz! 5.0.0